Career Academy – Certified Ethical Hacker v7 (CEH) 3 DVDs
English | 3 DVDs | ISO | 5.36 GB
Genre: Video Training
English | 3 DVDs | ISO | 5.36 GB
Genre: Video Training
EC-Council CEH Certified Ethical Hacker v7.1 Training – OnDemand Learning
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.
Students will begin by understanding how perimeter defenses work and
then be lead into scanning and attacking their own networks, no real
network is harmed. Students then learn how intruders escalate privileges
and what steps can be taken to secure a system. Students will also
learn about Intrusion Detection, Policy Creation, Social Engineering,
DDoS Attacks, Buffer Overflows and Virus Creation. When a student
completes the course they will have hands on understanding and
experience in Ethical Hacking. This course prepares you for EC-Council
Certified Ethical Hacker exam 312-50
Career Academy is an EC-Council endorsed training provider. We have invited the best security trainers in the industry to help us develop the ultimate training and certification program which includes everything you will need to fully prepare for and pass your certification exams. This officially endorsed product gives our students access to the exam by providing you with an Authorization Code. The EC-Council Authorization Code can be used at any Prometric center, this Authorization Code is required and mandatory for you to schedule and pay for your exam. Without this Authorization Code, Prometric will not entertain any of your requests to schedule and take the exam
Official CBT from Career Academy
EC-Council CEH Certified Ethical Hacker v7.1 Training – OnDemand Learning
Mentor: Eric Reed – EC-Council Master Certified Instructor, CEH, CHFI, ECSA/LPT, CISSP, MCT, MCSE: Security
Modules Description
Module 00 – Student IntroductionModule 01 – Introduction to Ethical Hacking
Module 02 – Footprinting and Reconnaissance
Module 03 – Scanning Networks
Module 04 – Enumeration
Module 05 – System Hacking
Module 06 – Trojans and Backdoors
Module 07 – Viruses and Worms
Module 08 – Sniffers
Module 09 – Social Engineering
Module 10 – Denial of Service
Module 11 – Session Hijacking
Module 12 – Hacking Webservers
Module 13 – Hacking Web Applications
Module 14 – SQL Injection
Module 15 – Hacking Wireless Networks
Module 16 – Evading IDS, Firewalls, and Honeypots
Module 17 – Buffer Overflow
Module 18 – Cryptography
Module 19 – Penetration Testing
No comments:
Post a Comment